RECIENTES :

Antivirus de técnicas de evasión y contramedidas



1. INTRODUCTION.A..................................... .................................................. ..................................3
2. ANTI-VIRUS EVASION TECHNIQUES .................................................. ....................................4
2.1 USE OF BINDERS AND PACKERS........................................... .................................................. .......4
2.2 CODE OBFUSCATION .................................................. .................................................. ................6
2.3 CODE CONVERSION FROM EXE TO CLIENT SIDE SCRIPTS........................................... ..................8
2.4 FAKE FILE TYPE EXTENSION .................................................. .................................................. ...9
3. MALICIOUS CODES IDENTIFICATION AND REMOVAL TECHNIQUES ............................10
3.1 MANUALLY IDENTIFYING MALICIOUS CODES .................................................. ..........................10
3.2 MANUALLY REMOVING VIRUSES AND WORMS............................................. ..............................11
4. COUNTERMEASURES AGAINST MALICIOUS CODES .................................................. .......15
5. CONCLUSION .................................................. .................................................. ........................16
6. ABOUT AUTHOR............................................ .................................................. ..........................16

Author: Debasis Mohanty


http://www.box.com/s/5xrnbx2hriqnih9mpiuz
Share this article :

Publicar un comentario

 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. TUSTOOLS - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger